A web application firewall inspects requests and filters those that are deemed malicious. In comparison, Client Reputation focuses on the source of the request, and determines the extent to which that source has sent malicious requests in the past. Register today for this upcoming webcast to find out more!

SC Magazine's SC Congress returns to London on 3 March, 2015 with an all new programme! Here is your chance to catch a full day of hard-hitting information security news and solutions from leaders in their industries that you can implement for your company.

As employees increasingly have mobile access to the corporate network this webcast will discuss the steps organisations can take to minimise risk among their workforce and detail what a mobile device management policy should look like and how to enforce it. Register today for this SC editorial webcast!

Commtouch launches three-tiered security technology

Commtouch has announced the launch of a unified engine to combine messaging and web security and anti-virus.

Combining Commtouch's GlobalView Web Security, Zero-Hour Virus Outbreak Protection and Command anti-virus, the latter of which was acquired from Authentium in September 2010, the company claimed that the three security technologies cross-enhance each other by sharing intelligence about internet threats.

In an instance where a phishing website threat is detected, the malicious URL is shared with Commtouch anti-spam so that emails containing the phishing link can be blocked. This data sharing is enabled by Commtouch's cloud-based GlobalView Network, which collects and analyses billions of internet transactions in real-time.

Amir Lev, CTO of Commtouch, said: “With a combined ‘triple-play' solution, each technology leverages the other to create an even stronger barrier against ever-increasing blended threats. From a business perspective, the single interface also reduces short and long-term integration and operational costs. This new engine presents a unified interface across our product lines, providing a thoroughly integrated, simplified and cost-effective combination of technologies for our partners.”

SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.